Booters (Black)List Generation and Ecosystem Analysis
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
data to reproduce the academic paper

Booters are Websites that publicly offer Distributed Denial of Service (DDoS) attacks as a paid service. Accordingly to the Federal Bureau of Investigation (FBI), Booters usage are considered 'crime if they are used against a Website without the owner's permission'. Our intention to generate/share this list is to facilitade the investigation of the entire market/ecosystem. NOTE that the following list includes offline Booters (for historical purposes). For only ONLINE booters, please clone our GitHub repository and re-run the 6th and 7th steps.

If you use, for academic purposes, the Booter (Black)List OR our methodology OR our analyses script, PLEASE don't forget to cite the publicly available Jair Santanna's Ph.D. thesis:

          title = { {DDoS-as-a-Service: Investigating Booter Websites} },
          author = {Santanna, José Jair},
          year = {2017}
          school = {University of Twente},
          address = {Enschede, The Netherlands},
          type = {Ph.D. thesis},
          isbn = {9789036544290},
          doi = {10.3990/1.9789036544290}


Our methodology to generate the Booter (Black)List is documented at:

  • J.J. Santanna. DDoS-as-a-Service: Investigating Booter Websites. Chapter 2. Ph.D. Thesis. University of Twente, 2017, ISBN: 978-90-365-4429-0.
  • J.J. Santanna, R. de O. Schmidt, D. Tuncer, J. de Vries, L.Z. Granville, and A. Pras. Booter List Generation: The Basis for Investigating DDoS-for-hire Websites. International Journal on Network Management (IJNM), 2017.
  • J.J. Santanna, R. de O. Schmidt, D. Tuncer, J. de Vries, L.Z. Granville, and A. Pras. Booter Blacklist: Unveiling DDoS-for-hire Websites. International Conference on Network and Service Management (CNSM). 2016.
  • J.J. Chromik, J.J. Santanna, and A. Pras.‘Booter websites characterization: Towards a list of threats’. Brazilian Symposium on Computer Networks and Distributed Systems (SBRC). 2015.

Examples of usage of the Booter (Black)List is documented at: